Semantic search

From Navigators

Jump to: navigation, search
Previous     Results 1– 110    Next        (20 | 50 | 100 | 250 | 500)

Publications

  • André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Ferreira Neves, “On the Challenges of Building a BFT SCADA,”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), 2018, pp. 8.

  • Alysson Bessani, Nuno Ferreira Neves, Paulo Verissimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia, “JITeR: Just-In-Time Application-Layer Routing”, Computer Networks, vol. 104, pp. 122–136, Jul. 2016.

  • Ibéria Medeiros, Nuno Ferreira Neves, Miguel Correia, “Web Application Protection with the WAP Tool”, in Fast Abstract at the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, USA, Jun. 2014.

  • Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Verissimo, “SCFS: A Shared Cloud-backed File System”, in Proceedings of the 2014 USENIX Annual Technical Conference (USENIX-ATC), Philadelphia, PA, US, Jun. 2014.

  • Miguel Garcia, Alysson Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro, “OS Diversity for Intrusion Tolerance: Myth or Reality?”, in Proceedings of the International Conference on Dependable Systems and Networks - DSN'11. Hong Kong, China, June 2011., Jun. 2011.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.

  • João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.

  • Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.

  • João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.

  • Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.

  • Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Intrusion-Tolerant Protection for Critical Infrastructures”, Missing institution, Tech. Rep., Apr. 2007. Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.

  • Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomized Intrusion-Tolerant Asynchronous Services”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, pages 568-577, June 2006, Jun. 2006.

  • Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Verissimo, Rui Neves, “Using Attack Injection to Discover New Vulnerabilities”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, June 2006., Jun. 2006.

  • Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Solving Vector Consensus with a Wormhole”, IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 12, pp. 1120-1131, December 2005., Dec. 2005.

  • Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Resilient State Machine Replication”, in In Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing (PRDC), Changsha, China, pages 305-309, December 2005., Dec. 2005.

  • José Pascoal, Tiago Jorge, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “FTP Tolerante a Intrusões”, in In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, November 2005., Oct. 2005.

  • Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “A New Approach to Proactive Recovery”, in In Fifth European Dependable Computing Conference (EDCC-5) Supplemental Volume. Budapest, Hungary, pages 35-40, April 2005., Apr. 2005.

  • Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Wormhole-Aware Byzantine Protocols”, in 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004., Jun. 2004.

  • Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Verissimo, “Low Complexity Byzantine-Resilient Consensus”, Missing institution, Tech. Rep., Oct. 2003. Technical Report DI/FCUL TR-03-25, Department of Computer Science, University of Lisbon. August 2003

  • J. Armstrong, C. Cachin, Miguel Correia, A. Costa, Hugo Miranda, Nuno Ferreira Neves, Nuno Miguel Neves, J. A. Poritz, B. Randell, Lau Cheuk Lung, Luís Rodrigues, R. J. Stroud, Paulo Verissimo, M. Waidner, I. S. Welch, “Complete Specification of APIs and Protocols for the MAFTIA Middleware”, Missing institution, Tech. Rep., Jul. 2002. Technical Report DI/FCUL TR-02-11, Department of Computer Science, University of Lisbon. jULY 2002

  • Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “The middleware architecture of MAFTIA: A blueprint”, in In Proceedings of the IEEE Third Information Survivability Workshop (ISW-2000), Boston, Massachusetts, USA, October 2000., Oct. 2000.

  • Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “The middleware architecture of MAFTIA: A blueprint.”, Missing institution, Tech. Rep., Sept. 2000. Technical Report DI/FCUL TR 00-6, Department of Computer Science, University of Lisbon, September 2000.

Previous     Results 1– 110    Next        (20 | 50 | 100 | 250 | 500)
Views
Personal tools
Toolbox
Navigators toolbox